Sciweavers

1754 search results - page 303 / 351
» The Computational Complexity of Delay Management
Sort
View
IWIA
2006
IEEE
15 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
LCN
2006
IEEE
15 years 3 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
SAINT
2006
IEEE
15 years 3 months ago
Dynamic Configuration of Semantic-Based Service Provisioning to Portable Devices
Context-awareness is starting to emerge as a key driving principle for the design and provisioning of pervasive services in pervasive computing environments. Semantic languages se...
Antonio Corradi, Rebecca Montanari, Alessandra Ton...
CIMCA
2005
IEEE
15 years 3 months ago
Applying a Web-Service-Based Model to Dynamic Service-Deployment
Owing to the increase in both heterogeneity and complexity in today’s networking systems, the need arises for an architecture for network-based services that provides flexibilit...
Christos Chrysoulas, Evangelos Haleplidis, Robert ...
ICMCS
2005
IEEE
100views Multimedia» more  ICMCS 2005»
15 years 3 months ago
A Fast Frame-Accurate H.264/MPEG-4 AVC Editing Method
H.264/MPEG-4 AVC has become widely used in various applications and services because of its high coding efficiency. With the spread of H.264/MPEG-4 AVC contents, it has been stron...
Akio Yoneyama, Yasuhiro Takishima, Yasuyuki Nakaji...